Sciweavers

1202 search results - page 209 / 241
» Knowledge as a Service and Knowledge Breaching
Sort
View
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
16 years 1 days ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
SP
2006
IEEE
169views Security Privacy» more  SP 2006»
15 years 5 months ago
A Safety-Oriented Platform for Web Applications
The Web browser has become the dominant interface to a broad range of applications, including online banking, Web-based email, digital media delivery, gaming, and ecommerce servic...
Richard S. Cox, Steven D. Gribble, Henry M. Levy, ...
MOBICOM
2003
ACM
15 years 5 months ago
Manycast: exploring the space between anycast and multicast in ad hoc networks
The characteristics of ad hoc networks naturally encourage the deployment of distributed services. Although current networks implement group communication methods, they do not sup...
Casey Carter, Seung Yi, Prashant Ratanchandani, Ro...
COOPIS
2002
IEEE
15 years 4 months ago
PROLOG/RDBMS Integration in the NED Intelligent Information System
Abstract. The following paper describes recent work on NED-2, an intelligent information system for ecosystem management currently in development by the USDA Forest Service. Using ...
Frederick Maier, Donald Nute, Walter D. Potter, Ji...
WECWIS
2002
IEEE
136views ECommerce» more  WECWIS 2002»
15 years 4 months ago
XML-based Advanced UDDI Search Mechanism for B2B Integration
Exploring an appropriate business application published as a Web Service in the UDDI registry is a critical issue. Search for such an application should be effective in terms of t...
Liang-Jie Zhang, Haifei Li, Henry Chang, Tian Chao